{"title":"JPEG认证水印不同嵌入方法的评价","authors":"A. Egorova, V. Fedoseev","doi":"10.18287/1613-0073-2019-2391-371-379","DOIUrl":null,"url":null,"abstract":"This paper considers the applicability of different data embedding methods for semifragile watermarking systems used for JPEG image authentication. The methods include Least Significant Bit watermarking and various versions of Quantization Index Modulation. In our investigations, we tested the semi-fragility property against JPEG and compared the visual quality of the watermarked images. We also checked the watermark fragility to unacceptable modifications like median filtering, blurring, and adding Gaussian noise. Finally, we analyzed the provided tampering localization error.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Evaluation of different embedding methods for JPEG authentication watermarking\",\"authors\":\"A. Egorova, V. Fedoseev\",\"doi\":\"10.18287/1613-0073-2019-2391-371-379\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper considers the applicability of different data embedding methods for semifragile watermarking systems used for JPEG image authentication. The methods include Least Significant Bit watermarking and various versions of Quantization Index Modulation. In our investigations, we tested the semi-fragility property against JPEG and compared the visual quality of the watermarked images. We also checked the watermark fragility to unacceptable modifications like median filtering, blurring, and adding Gaussian noise. Finally, we analyzed the provided tampering localization error.\",\"PeriodicalId\":10486,\"journal\":{\"name\":\"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.18287/1613-0073-2019-2391-371-379\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18287/1613-0073-2019-2391-371-379","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Evaluation of different embedding methods for JPEG authentication watermarking
This paper considers the applicability of different data embedding methods for semifragile watermarking systems used for JPEG image authentication. The methods include Least Significant Bit watermarking and various versions of Quantization Index Modulation. In our investigations, we tested the semi-fragility property against JPEG and compared the visual quality of the watermarked images. We also checked the watermark fragility to unacceptable modifications like median filtering, blurring, and adding Gaussian noise. Finally, we analyzed the provided tampering localization error.